Jinxin Ma

According to our database1, Jinxin Ma authored at least 20 papers between 2012 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
HFuzz: Towards automatic fuzzing testing of NB-IoT core network protocols implementations.
Future Gener. Comput. Syst., 2020

IoTSIT: A Static Instrumentation Tool for IoT Devices.
IEEE Access, 2020

Attention-over-Attention Field-Aware Factorization Machine.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
InsFuzz: Fuzzing Binaries With Location Sensitivity.
IEEE Access, 2019

2018
TinyVisor: An extensible secure framework on android platforms.
Comput. Secur., 2018

A systematic review of fuzzing techniques.
Comput. Secur., 2018

Medhere: A Smartwatch-based Medication Adherence Monitoring System using Machine Learning and Distributed Computing.
Proceedings of the 40th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2018

H-Securebox: A Hardened Memory Data Protection Framework on ARM Devices.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Fuzzing Test Method Based on Constraint-Conditions Priority for LTE-EPC Protocol.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2018

An Optimization Safety Solution for Sip Call Base on ESP.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2018

2017
Manifold ranking weighted local maximal occurrence descriptor for person re-identification.
Proceedings of the 15th IEEE International Conference on Software Engineering Research, 2017

2016
The generation of XSS attacks developing in the detect detection.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

A program behavior recognition algorithm based on assembly instruction sequence similarity.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

2015
Transferable Optimal-size Fair E-cash with Optimal Anonymity.
Proceedings of the 2015 International Symposium on Theoretical Aspects of Software Engineering, 2015

Enhancing symbolic execution method with a taint layer.
Proceedings of the Seventh International Conference on Advanced Computational Intelligence, 2015

Enhancing fuzzing with a minimum set solver.
Proceedings of the Seventh International Conference on Advanced Computational Intelligence, 2015

Characterization of Android Applications with Root Exploit by Using Static Feature Analysis.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2014
SymWalker: Symbolic Execution in Routines of Binary Code.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

TWalker: An efficient taint analysis tool.
Proceedings of the 10th International Conference on Information Assurance and Security, 2014

2012
File Parsing Vulnerability Detection with Symbolic Execution.
Proceedings of the Sixth International Symposium on Theoretical Aspects of Software Engineering, 2012


  Loading...